[HTML][HTML] A survey on security attacks and intrusion detection mechanisms in named data networking

A Hidouri, N Hajlaoui, H Touati, M Hadded… - Computers, 2022 - mdpi.com
Despite the highly secure content sharing and the optimized forwarding mechanism, the
content delivery in a Named Data Network (NDN) still suffers from numerous vulnerabilities …

Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks

K Lei, J Fang, Q Zhang, J Lou, M Du, J Huang… - Journal of Grid …, 2020 - Springer
Recent advances in artificial intelligence, big data, mobile edge computing and embedded
systems have successfully driven the emergence and adoption of smart vehicles and vehicle …

Flight web searches analytics through big data

A Khalil, MJ Awan, A Yasin, VP Singh… - International …, 2022 - inderscienceonline.com
The flight search is considered one of the biggest searches on the World Wide Web. This
study aims to establish an effective prediction model from a huge data set. This article offers …

Gini impurity based NDN cache pollution attack defence mechanism

VP Singh, RL Ujjwal - Journal of Information and Optimization …, 2020 - Taylor & Francis
Abstract Name Data Network (NDN) is a futuristic Internet architecture that delivers content
based on strategically chosen names and caches content on intermediate routers in the …

NDN content poisoning attack mitigation using fuzzy-reputation based trust

VP Singh, RL Ujjwal - Innovations in Cyber Physical Systems: Select …, 2021 - Springer
Content poisoning attack is a primary cause of denial of service attack in current TCP/IP
Internet architecture. It is affecting one of the proposed content-oriented future Internet …

Cyber Attack Modeling Recent Approaches: A Review

Neha, A Maurya - Proceedings of Third International Conference on …, 2022 - Springer
The advancement in cyber technology has enhanced user convenience tremendously
hence accelerated its uses. But at the same time, cyber frauds, threats, and attacks have …

Threat identification and risk assessments for named data networking architecture using SecRam

VP Singh, RL Ujjwal - International Journal of Knowledge …, 2021 - content.iospress.com
Named Data networking is an instance of information centric networking, aims to improve
the performance of the Internet by using in-network caching at storage-enabled routers and …